{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:36:59Z","timestamp":1773693419619,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T00:00:00Z","timestamp":1533686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,8]]},"DOI":"10.1145\/3230977.3230981","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":101,"title":["Metacognitive Difficulties Faced by Novice Programmers in Automated Assessment Tools"],"prefix":"10.1145","author":[{"given":"James","family":"Prather","sequence":"first","affiliation":[{"name":"Abilene Christian University, Abilene, TX, USA"}]},{"given":"Raymond","family":"Pettit","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Kayla","family":"McMurry","sequence":"additional","affiliation":[{"name":"USAA, San Antonio, TX, USA"}]},{"given":"Alani","family":"Peters","sequence":"additional","affiliation":[{"name":"USAA, San Antonio, TX, USA"}]},{"given":"John","family":"Homer","sequence":"additional","affiliation":[{"name":"Abilene Christian University, Abilene, TX, USA"}]},{"given":"Maxine","family":"Cohen","sequence":"additional","affiliation":[{"name":"Nova Southeastern University, Ft. Lauderdale, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A survey of automated assessment approaches for programming assignments. Computer science education 15, 2","author":"Ala-Mutka Kirsti M","year":"2005","unstructured":"Kirsti M Ala-Mutka. 2005. A survey of automated assessment approaches for programming assignments. Computer science education 15, 2 (2005), 83--102."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2098442"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.59"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591124"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844584"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2899463"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159461"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089786.1089794"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwu022"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2675327.2675330"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591748"},{"key":"e_1_3_2_1_13_1","volume-title":"Introducing a course on calculi. https:\/\/ www.cs.utexas.edu\/users\/EWD\/transcriptions\/EWD12xx\/EWD1213.html Remarks by Edsger Dijkstra at Department of Computer Sciences","author":"Dijkstra Edsger W.","year":"2017","unstructured":"Edsger W. Dijkstra. 1995. Introducing a course on calculi. https:\/\/ www.cs.utexas.edu\/users\/EWD\/transcriptions\/EWD12xx\/EWD1213.html Remarks by Edsger Dijkstra at Department of Computer Sciences, The University of Texas at Austin {Accessed: 2017 08 25}."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163405.1163409"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1930464.1930485"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949390"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597849.1384371"},{"key":"e_1_3_2_1_18_1","volume-title":"Protocol analysis","author":"Ericsson Karl Anders","unstructured":"Karl Anders Ericsson and Herbert Alexander Simon. 1993. Protocol analysis. MIT press Cambridge, MA."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/0031383930370305"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591715"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2004.1408551"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236560"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753478"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/771141.771154"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141880.3141904"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/367415.367422"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/792548.611956"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1930464.1930480"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858796.2858798"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2005.1611967"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2015.7357222"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401796.2401798"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240844"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2899422"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.47"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828968"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016934"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2602724.2602752"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858252"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868358.1868363"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445218"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953308"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048237.2048241"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4561.001.0001"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352191"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105726.3106178"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677279"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/3055338.3079060"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017768"},{"key":"e_1_3_2_1_51_1","volume-title":"How to solve it: A new aspect of mathematical method (2014 reprint ed.)","author":"Polya George","unstructured":"George Polya. 1945. How to solve it: A new aspect of mathematical method (2014 reprint ed.). Princeton university press."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105726.3106169"},{"key":"e_1_3_2_1_53_1","volume-title":"Evaluating metacognitive scaffolding in guided invention activities. Instructional science 40, 4","author":"Roll Ido","year":"2012","unstructured":"Ido Roll, Natasha G Holmes, James Day, and Doug Bonn. 2012. Evaluating metacognitive scaffolding in guided invention activities. Instructional science 40, 4 (2012), 691--710."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1386686"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/199691.199769"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/223278.223280"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1584322.1584334"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2667199.2667209"},{"key":"e_1_3_2_1_59_1","unstructured":"Dwayne Towell and Brent Reeves. 2009. From Walls to Steps: Using online automatic homework checking tools to improve learning in introductory programming courses. (2009)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/602570"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/648030.745821"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33642-3_25"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591762"}],"event":{"name":"ICER '18: International Computing Education Research Conference","location":"Espoo Finland","acronym":"ICER '18","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2018 ACM Conference on International Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230977.3230981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230977.3230981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:10Z","timestamp":1750210750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230977.3230981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,8]]},"references-count":62,"alternative-id":["10.1145\/3230977.3230981","10.1145\/3230977"],"URL":"https:\/\/doi.org\/10.1145\/3230977.3230981","relation":{},"subject":[],"published":{"date-parts":[[2018,8,8]]},"assertion":[{"value":"2018-08-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}